US8665819B2 - System and method for providing mobility between heterogenous networks in a communication environment - Google Patents
System and method for providing mobility between heterogenous networks in a communication environment Download PDFInfo
- Publication number
- US8665819B2 US8665819B2 US12/488,151 US48815109A US8665819B2 US 8665819 B2 US8665819 B2 US 8665819B2 US 48815109 A US48815109 A US 48815109A US 8665819 B2 US8665819 B2 US 8665819B2
- Authority
- US
- United States
- Prior art keywords
- wimax
- network
- address
- message
- events
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000004891 communication Methods 0.000 title description 36
- 238000000034 methods Methods 0.000 description 33
- 230000004044 response Effects 0.000 description 28
- 230000000694 effects Effects 0.000 description 6
- 230000000875 corresponding Effects 0.000 description 5
- 238000010586 diagrams Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 5
- 280000638271 Reference Point companies 0.000 description 4
- 230000001934 delay Effects 0.000 description 4
- 239000010410 layers Substances 0.000 description 4
- 241000465502 Tobacco latent virus Species 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000006011 modification reactions Methods 0.000 description 3
- 231100000627 threshold limit value Toxicity 0.000 description 3
- 230000001960 triggered Effects 0.000 description 3
- 210000001138 Tears Anatomy 0.000 description 2
- 230000004075 alteration Effects 0.000 description 2
- 230000000977 initiatory Effects 0.000 description 2
- 238000006467 substitution reactions Methods 0.000 description 2
- 281000059722 Airwide Solutions companies 0.000 description 1
- 241000212893 Chelon labrosus Species 0.000 description 1
- 230000037250 Clearance Effects 0.000 description 1
- XCCTYIAWTASOJW-XVFCMESISA-N Uridine-5'-Diphosphate Chemical compound data:image/svg+xml;base64,<?xml version='1.0' encoding='iso-8859-1'?>
<svg version='1.1' baseProfile='full'
              xmlns='http://www.w3.org/2000/svg'
                      xmlns:rdkit='http://www.rdkit.org/xml'
                      xmlns:xlink='http://www.w3.org/1999/xlink'
                  xml:space='preserve'
width='300px' height='300px' viewBox='0 0 300 300'>
<!-- END OF HEADER -->
<rect style='opacity:1.0;fill:#FFFFFF;stroke:none' width='300' height='300' x='0' y='0'> </rect>
<path class='bond-0' d='M 181.622,121.583 L 188.189,116.251 L 186.252,114.503 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 188.189,116.251 L 190.883,107.423 L 194.757,110.918 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 188.189,116.251 L 186.252,114.503 L 190.883,107.423 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-1' d='M 181.622,121.583 L 155.681,118.831' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-24' d='M 181.622,121.583 L 187.021,147.105' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-2' d='M 155.681,118.831 L 152.304,110.356 L 150.044,111.659 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 152.304,110.356 L 144.407,104.486 L 148.928,101.882 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 152.304,110.356 L 150.044,111.659 L 144.407,104.486 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-3' d='M 155.681,118.831 L 145.048,142.652' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 142.442,142.937 L 142.55,143.447' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 139.836,143.221 L 140.052,144.242' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 137.229,143.506 L 137.553,145.037' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 134.623,143.791 L 135.055,145.832' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 132.017,144.075 L 132.557,146.627' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 129.411,144.36 L 130.059,147.423' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 126.805,144.645 L 127.561,148.218' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 124.199,144.929 L 125.063,149.013' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 121.593,145.214 L 122.564,149.808' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 118.987,145.499 L 120.066,150.603' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 145.048,142.652 L 151.398,148.381' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 151.398,148.381 L 157.747,154.109' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 119.526,148.051 L 116.618,156.973' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 116.618,156.973 L 113.709,165.896' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 104.772,174.263 L 98.3908,175.613' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 98.3908,175.613 L 92.0097,176.963' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 87.3914,185.208 L 88.6192,191.012' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 88.6192,191.012 L 89.8471,196.816' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 87.0004,170.755 L 85.7725,164.951' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 85.7725,164.951 L 84.5447,159.146' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 81.8961,171.835 L 80.6683,166.03' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 80.6683,166.03 L 79.4404,160.226' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 79.8299,179.539 L 73.4488,180.889' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 73.4488,180.889 L 67.0677,182.239' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 54.1471,176.694 L 51.5996,173.859' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 51.5996,173.859 L 49.0521,171.024' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 49.0521,158.775 L 52.3739,155.789' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 52.3739,155.789 L 55.6957,152.804' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 36.8723,157.47 L 34.3248,154.636' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 34.3248,154.636 L 31.7772,151.801' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 35.1287,167.78 L 31.8069,170.765' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 31.8069,170.765 L 28.485,173.75' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 38.6159,171.66 L 35.2941,174.645' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 35.2941,174.645 L 31.9723,177.63' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 171.086,156.284 L 179.053,151.694' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 179.053,151.694 L 187.021,147.105' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 188.659,148.122 L 188.871,147.645' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 190.297,149.139 L 190.722,148.186' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 191.935,150.155 L 192.573,148.726' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 193.573,151.172 L 194.423,149.267' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 195.211,152.189 L 196.274,149.807' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 196.849,153.206 L 198.125,150.348' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 198.487,154.223 L 199.976,150.888' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 200.125,155.24 L 201.826,151.429' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 201.763,156.257 L 203.677,151.969' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 203.401,157.274 L 205.528,152.509' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 211.566,164.694 L 212.554,174.189' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 212.554,174.189 L 213.543,183.684' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 217.218,153.114 L 224.589,147.77' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 224.589,147.77 L 231.96,142.426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 212.011,181.572 L 204.787,186.811' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 204.787,186.811 L 197.562,192.049' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 215.074,185.796 L 207.849,191.034' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 207.849,191.034 L 200.624,196.273' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 213.543,183.684 L 222.265,187.577' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 222.265,187.577 L 230.986,191.471' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 243.74,189.694 L 251.111,184.349' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 251.111,184.349 L 258.482,179.005' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 257.419,181.387 L 265.995,185.215' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 265.995,185.215 L 274.57,189.043' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 259.546,176.623 L 268.121,180.451' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 268.121,180.451 L 276.697,184.279' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-22' d='M 258.482,179.005 L 255.781,153.059' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 255.781,153.059 L 231.96,142.426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 250.081,156.228 L 233.407,148.785' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<text dominant-baseline="central" text-anchor="start" x='195.905' y='103.519' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='145.851' y='97.5317' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='108.25' y='174.157' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='85.9198' y='179.555' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='88.1275' y='205.077' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='77.3299' y='154.034' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='60.3984' y='184.954' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='42.9622' y='165.552' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='59.1739' y='148.115' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='28.7171' y='146.149' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='26.7505' y='182.988' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='164.417' y='161.43' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='210.841' y='159.042' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='195.615' y='200.301' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='237.363' y='195.622' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='234.465' y='204.317' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>H</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='279.112' y='190.943' style='font-size:8px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
</svg>
 data:image/svg+xml;base64,<?xml version='1.0' encoding='iso-8859-1'?>
<svg version='1.1' baseProfile='full'
              xmlns='http://www.w3.org/2000/svg'
                      xmlns:rdkit='http://www.rdkit.org/xml'
                      xmlns:xlink='http://www.w3.org/1999/xlink'
                  xml:space='preserve'
width='85px' height='85px' viewBox='0 0 85 85'>
<!-- END OF HEADER -->
<rect style='opacity:1.0;fill:#FFFFFF;stroke:none' width='85' height='85' x='0' y='0'> </rect>
<path class='bond-0' d='M 50.9595,33.9486 L 53.1537,32.0682 L 52.6049,31.5731 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 53.1537,32.0682 L 54.2503,29.1975 L 55.3479,30.1877 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-0' d='M 53.1537,32.0682 L 52.6049,31.5731 L 54.2503,29.1975 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-1' d='M 50.9595,33.9486 L 43.6097,33.1689' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-24' d='M 50.9595,33.9486 L 52.4892,41.1797' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-2' d='M 43.6097,33.1689 L 42.44,30.3981 L 41.7996,30.7671 Z' style='fill:#3B4143;fill-rule:evenodd;fill-opacity=1;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 42.44,30.3981 L 39.9895,28.3652 L 41.2704,27.6273 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-2' d='M 42.44,30.3981 L 41.7996,30.7671 L 39.9895,28.3652 Z' style='fill:#E84235;fill-rule:evenodd;fill-opacity=1;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;' />
<path class='bond-3' d='M 43.6097,33.1689 L 40.5969,39.9181' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 39.8585,39.9987 L 39.8891,40.1433' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 39.1201,40.0794 L 39.1813,40.3686' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 38.3817,40.16 L 38.4735,40.5939' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 37.6433,40.2407 L 37.7656,40.8192' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 36.9049,40.3213 L 37.0578,41.0444' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 36.1665,40.402 L 36.35,41.2697' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 35.4281,40.4826 L 35.6422,41.495' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 34.6897,40.5633 L 34.9344,41.7203' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 33.9513,40.644 L 34.2266,41.9456' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-4' d='M 33.2129,40.7246 L 33.5188,42.1708' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 40.5969,39.9181 L 42.7655,41.8746' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-14' d='M 42.7655,41.8746 L 44.9342,43.831' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 33.3658,41.4477 L 32.4212,44.3454' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-5' d='M 32.4212,44.3454 L 31.4766,47.243' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 29.9245,48.7182 L 27.3774,49.257' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-6' d='M 27.3774,49.257 L 24.8303,49.7958' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 24.1045,51.2364 L 24.6088,53.62' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-7' d='M 24.6088,53.62 L 25.113,56.0037' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 24.3065,48.6197 L 23.8022,46.236' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 23.8022,46.236 L 23.298,43.8523' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 22.8603,48.9256 L 22.356,46.5419' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-8' d='M 22.356,46.5419 L 21.8518,44.1583' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 22.8576,50.2132 L 20.3105,50.752' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-9' d='M 20.3105,50.752 L 17.7634,51.2908' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 15.5059,50.3023 L 14.0824,48.7183' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-10' d='M 14.0824,48.7183 L 12.659,47.1343' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 12.659,45.1503 L 14.3393,43.6403' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-11' d='M 14.3393,43.6403 L 16.0196,42.1304' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 10.6863,44.9391 L 9.26281,43.3551' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-12' d='M 9.26281,43.3551 L 7.83936,41.7711' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 10.1922,46.3734 L 8.51194,47.8833' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 8.51194,47.8833 L 6.83165,49.3933' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 11.1803,47.4728 L 9.49999,48.9828' style='fill:none;fill-rule:evenodd;stroke:#FF60B7;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-13' d='M 9.49999,48.9828 L 7.81971,50.4928' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 47.2352,44.2062 L 49.8622,42.693' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-15' d='M 49.8622,42.693 L 52.4892,41.1797' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 53.0272,41.5008 L 53.0875,41.3658' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 53.5652,41.8219 L 53.6857,41.5519' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 54.1032,42.143 L 54.284,41.7381' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 54.6413,42.4641 L 54.8823,41.9242' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 55.1793,42.7852 L 55.4806,42.1103' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 55.7173,43.1063 L 56.0788,42.2964' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 56.2553,43.4274 L 56.6771,42.4826' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 56.7933,43.7486 L 57.2754,42.6687' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 57.3313,44.0697 L 57.8737,42.8548' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-16' d='M 57.8694,44.3908 L 58.4719,43.0409' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 59.3666,45.4243 L 59.6852,48.4841' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-17' d='M 59.6852,48.4841 L 60.0038,51.5438' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 60.306,43.4183 L 62.7641,41.6361' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-25' d='M 62.7641,41.6361 L 65.2221,39.8539' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 59.5699,50.9454 L 57.1533,52.6976' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 57.1533,52.6976 L 54.7367,54.4498' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 60.4376,52.1422 L 58.021,53.8944' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-18' d='M 58.021,53.8944 L 55.6044,55.6466' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 60.0038,51.5438 L 62.8445,52.8119' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-19' d='M 62.8445,52.8119 L 65.6852,54.08' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 67.8206,53.7825 L 70.2787,52.0003' style='fill:none;fill-rule:evenodd;stroke:#4284F4;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-20' d='M 70.2787,52.0003 L 72.7367,50.2181' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 72.4354,50.893 L 75.2347,52.1426' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 75.2347,52.1426 L 78.0341,53.3922' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 73.038,49.5431 L 75.8373,50.7927' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-21' d='M 75.8373,50.7927 L 78.6366,52.0423' style='fill:none;fill-rule:evenodd;stroke:#E84235;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-22' d='M 72.7367,50.2181 L 71.9713,42.8667' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 71.9713,42.8667 L 65.2221,39.8539' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<path class='bond-23' d='M 70.3563,43.7646 L 65.6319,41.6557' style='fill:none;fill-rule:evenodd;stroke:#3B4143;stroke-width:2px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1' />
<text dominant-baseline="central" text-anchor="start" x='55.0063' y='28.8303' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='40.8245' y='27.134' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='30.1709' y='48.8444' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='23.8439' y='50.3741' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='24.4695' y='57.6051' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='21.4101' y='43.143' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='16.6129' y='51.9037' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='11.6726' y='46.4063' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#FF60B7' ><tspan>P</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='16.2659' y='41.466' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>OH</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='7.63651' y='40.9088' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>HO</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='7.07931' y='51.3465' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='46.0847' y='45.2386' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='59.2383' y='44.562' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="end" x='54.9242' y='56.2519' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
<text dominant-baseline="central" text-anchor="middle" x='66.7529' y='54.9262' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>N</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='65.9316' y='57.3899' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#4284F4' ><tspan>H</tspan></text>
<text dominant-baseline="central" text-anchor="start" x='78.5817' y='53.6004' style='font-size:2px;font-style:normal;font-weight:normal;fill-opacity:1;stroke:none;font-family:sans-serif;fill:#E84235' ><tspan>O</tspan></text>
</svg>
 O[C@@H]1[C@H](O)[C@@H](COP(O)(=O)OP(O)(O)=O)O[C@H]1N1C(=O)NC(=O)C=C1 XCCTYIAWTASOJW-XVFCMESISA-N 0.000 description 1
- 280000819783 Wireless Broadband Access companies 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular Effects 0.000 description 1
- 230000035512 clearance Effects 0.000 description 1
- 230000001419 dependent Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005516 engineering processes Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 235000010384 tocopherol Nutrition 0.000 description 1
- 230000014616 translation Effects 0.000 description 1
- 235000019731 tricalcium phosphate Nutrition 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
- H04W12/06—Authentication
- H04W12/0602—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/02—Inter-networking arrangements
Abstract
Description
This disclosure relates in general to the field of communications and, more particularly, to providing mobility in a network environment.
Networking architectures have grown increasingly complex in communication environments. Multi-access networks (e.g., Wi-Fi and WiMax) have gained notoriety in recent times. WiMax can enable the delivery of last mile wireless broadband access as an alternative to wired broadband (like cable and DSL). WiMax can provide fixed, nomadic, portable, and mobile wireless broadband connectivity without the need for a direct line-of-sight with a base station. Most techniques for handling mobility are focused on a single technology, while few solutions account for different network protocols. Multi-access networks pose a number of problems. For example, issues can arise for user identification, along with coordinating mobility across disparate networks.
To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
Overview
A method is provided in one example embodiment and includes providing an Internet Protocol (IP) address based on an authentication request associated with a device, the authentication request being associated with a Wi-Fi protocol. The method also includes
identifying a Wi-Fi event associated with the IP address, and mapping the Wi-Fi event to a WiMax event. Further, the method includes providing a WiMax message, which is based on the Wi-Fi event, to a network element. In other embodiments, the mapping further includes converting the Wi-Fi event to the WiMax message such that the WiMax message is presented to the network element in a WiMax format. The same IP address can be used for both the Wi-Fi event and the WiMax message. In yet other embodiments, the method includes communicating a disconnection request to the network element when the device moves from a Wi-Fi coverage area to a WiMax coverage area, mapping a new WiMax event to a new Wi-Fi event, and providing a Wi-Fi message, which is based on the new WiMax event, to the device.
Turning to
Communication system 10 may include multiple instances of UE 20, which can be coupled to multiple base stations 30 and Wi-Fi access point 32 through a suitable interface (e.g., an R1 interface in a WiMax implementation). In one example, each base station (BS) and each Wi-Fi access point 32 may be coupled to a respective access service network gateway, which may further include a combined foreign agent in some example implementations. The interaction between base stations 30 and Wi-Fi access point 32, and ASN-GWs 40 and 42 may occur through a series of interfaces (e.g., the R6 interface). Another interface (e.g., the R8 interface) may be used by the base stations to communicate with each other.
In one example embodiment, the R1 interface is the radio wireless interface between a WiMax terminal and the base station. Its protocol could be defined by IEEE 802.16d/e, which provides quality of service (QoS) policy parameters. The R6 interface standard is provided by the WiMax Forum Network Working Group (NWG). The R4 interface accommodates mobility between two ASN-GWs. The R3 interface is provided between access service networks and connectivity service networks (CSNs).
For purposes of illustrating some example techniques of communication system 10, it is important to understand the communications that may be traversing the network and which provide routing information to any given network element. The following foundational information may be viewed as a basis from which the present disclosure may be properly explained. Such information is offered earnestly for purposes of explanation only and, accordingly, should not be construed in any way to limit the broad scope of the present disclosure and its potential applications. The 3GPP 23.827 protocol requires two separate paths from a WLAN infrastructure: one to the Internet side and a second to the 3G side. This implies changes to the common WLAN infrastructure. Analyzing the handovers across two access networks (e.g., such as Wi-Fi and WiMax) reveals that a significant amount of time is spent in authentication.
Communication system 10 can offer an optimized architecture to handle Wi-Fi and WiMax mobility, while delivering low latency handovers. One model of communication system 10 allows Wi-Fi access point 32 to connect [using the R6 interface] to the WiMax ASN-GW, which enables a common access anchor across Wi-Fi and WiMax. In regards to client device authentication/security virtualization, the client device virtualization function allows the client to map a common MAC address/device identity to be used across multiple access networks. In the context presented herein, this could apply to Wi-Fi (802.11) and WiMax (802.16e). This allows the same authentication and security framework to be applied to underlying Wi-Fi and WiMax links. Additionally, for the R6 mapping function at the Wi-Fi access point, the objective is to keep mobility across Wi-Fi and WiMax seamless (such that it gives the semblance of a single access mechanism). The mapping function, and its relationship to an ASN-GW, can be enabled on a SSID basis. [The SSID (Service Set Identifier) is a token, which identifies an 802.11 (Wi-Fi) network.] This allows the same access link to multiple ASN-GWs. Note that in typical deployments, the SSID is a secret key that is set by the network administrator. An end user can use the SSID to join an 802.11 network.
In one example implementation, Wi-Fi events are appropriately mapped to WiMax events (e.g., R6 events) so that client associations, extensible authentication protocol (EAP), and security are translated back to the ASN-GW mode of operation. R6 events from the Wi-Fi access point can be tagged with an access type of Wi-Fi. [One example mapping between Wi-Fi and WiMax is provided by
In addition, there is a common user authentication method (e.g., EAP-Tunneled Transport Layer Security (TTLS)) being applied across multiple access interfaces in a transparent manner. In one example implementation, there is an optional multi-registration mechanism at the ASN-GW. Wi-Fi access point 32 and/or the WiMax base station may be allowed to facilitate network initiated handover scenarios. These handover scenarios can include parameters such as the signal strength used for connecting access, timestamps of access, etc. Also, the approach outlined herein can be used for a consistent policy and quality of service (QoS) mechanism across Wi-Fi and WiMax. The R6 mapping at the access point can apply the WiMax QoS mechanisms to Wi-Fi, allowing a consistent QoS understanding across Wi-Fi and WiMax protocols.
In using a common architecture across Wi-Fi and WiMax (e.g., in using a MAC virtualization at the client and an R6 mapping at the network to allow both Wi-Fi and WiMax to be managed by a single mobility gateway (ASN-GW)), a number of advantages may be achieved. For example, such an architecture allows a low latency handover/mobility solution across Wi-Fi and WiMax. Also, such an approach keeps the IP address intact, and accommodates weak coverage on one of the two radio networks. Additionally, such an approach allows mixed coverage of WiMax networks with Wi-Fi in a seamless fashion. Moreover, such a solution can offer a single client identity across Wi-Fi and WiMax when being employed under the same operator. It further allows an easier integration of the Wi-Fi access point [based on SSID] into the WiMax network.
Some of these activities and features can be best understood in the context of an example. Consider a service scenario where an end user, Bob, has a handheld device (e.g., represented by UE 20) such as a PDA or a laptop with both 802.11 and 802.16 capabilities. Bob signs up with a provider that offers connectivity using 802.11 or 802.16. The provider offers Bob a connectivity option package, “Any access, always connected.” Bob is a businessperson, who travels constantly, and who expects a seamless experience to all network services (including voice). The service provider seeks to facilitate a seamless roaming experience across Wi-Fi and WiMax. Typically, many indoor areas are covered using 802.11, and outdoor areas can be covered with 802.16, where a seamless experience can exploit this environment to facilitate a lower cost radio network.
There are several challenges for a service provider in this instance. First, the service should account for how the 802.11 network interacts with a WiMax provider's 802.16 network. Second, the service provider should consider if there is a cost-effective model that facilitates a partner Wi-Fi access point to be connected to the WiMax provider's network. Third, the service provider should account for how mobility is handled across the 802.11 and 802.16 protocols, while latency is kept to a minimum. Fourth, the service provider should account for having two sets of credentials: one for Wi-Fi and one for WiMax.
Note that common to both 802.11 and 802.16 networks, control plane messages are used to establish and tear down connections between different entities in a network. In regards to a user (Bob) roaming between Wi-Fi and WiMax networks (e.g., a user roams between networks connected between the same mobility anchor), the following could occur. In this instance, Bob has a multi-mode capable Network Interface Card (NIC). Initially, Bob is in an area where Wi-Fi coverage is fine for his needs. His NIC initiates a connection to an access point (e.g., Wi-Fi access point 32) using an association request that is mapped to a pre-attachment request. The request is forwarded to a suitable anchor (e.g. ASN-GW 40). Since this is Bob's initial connection, a full authentication is performed. An EAP Request from the AAA server (e.g., home AAA 46) is communicated to the NIC, which then provides its credentials. Once the authentication returns a success indication, a mapping function (e.g., provided in mapping module 34) triggers an attachment request, whose result is returned back to Bob's NIC (as an association response).
Once a connection is established, the NIC's dynamic host configuration protocol (DHCP) requests are forwarded by the mapping function (e.g., mapping module 34) to the DHCP server, and the assigned IP address can be cached before forwarded to the NIC. The data plane is now established, and Bob can access services from his provider.
Now consider Bob when he is mobile (i.e., Bob moves away from the Wi-Fi hotspot, and at a certain point the signal strength is below the threshold for sustaining the connection). However, imagine that WiMax coverage is available in his new area. The NIC can now connect through the WiMax network. When Bob roams away from the Wi-Fi coverage, the access point (Wi-Fi access point 32) can send a disconnection notification to the mobility anchor (ASN-GW 40). Now, Bob connects through the WiMax card. Note that in this case, Bob's request is routed to the same anchor, which recognizes him as a roaming client. Thus, a fresh authentication is avoided, and re-authentication is completed in a fraction of the time required for complete authentication. The DHCP server can assign the same IP address as earlier, which completes the seamless handover.
An end user operating user equipment 20 has the option to connect to the network via, for example, a WiMax base station or Wi-Fi access point 32. Typically, when an end user connects to a Wi-Fi interface and to a WiMax interface, there are two devices present. Indirectly, this would be represented with two IP addresses, which need to be coordinated for conducting respective sessions. In contrast to this implementation, even in cases where an end user connects to both interfaces, a single device could exist in the network (e.g., from the perspective of the service provider). Regardless of how an end user is connecting, a single IP address can be used. This engenders the ability to provide a low latency solution.
In one generic sense, the access point talks Wi-Fi to its clients and WiMax to the ASN-GW.
In offering a low latency mobility scheme, the proposed architecture can employ Wi-Fi access point 32 as a WiMax base station. In particular, one embodiment can offer a mapping function being provided in Wi-Fi access point 32 to handle mobility across Wi-Fi and WiMax. The mapping function can map events between 802.11 and R6 events and, thus, allows the device to appear as a normal access point to the client, and a normal WiMax base station to the ASN-GW. An added advantage to this approach is that the client and the ASN-GW are not necessarily aware of the mapping taking place in the access point. Hence, in one example implementation, hardware or software changes can be avoided at these entities.
Before turning to some of the operations of this architecture, a brief discussion is provided about some of the infrastructure of
ASN-GWs 40 and 42 are network elements that facilitate service flows between endpoints and a given network (e.g., for networks such as those illustrated in
Wi-Fi access point 32 is a wireless access point element that allows wireless communication devices to connect to a wireless network using Wi-Fi, Bluetooth, 802.XX, or related standards. In certain examples, Wi-Fi access point 32 can facilitate WiMax connectivity (and help coordinate such activity). This may include assistance from mapping module 34, which can map events between two protocols, as outlined herein. Wi-Fi access point 32 can connect to a wired network, and can relay data between the wireless devices (e.g., computers or printers) and wired devices on the network.
Mapping module 34 offers a Wi-Fi to WiMax event mapping function. In one example, this feature can run as a daemon/service inside a given access point (and, further, is activated upon boot up). In one non-limiting sense, it acts as an intermediary, triggering appropriate WiMax R6 events using Wi-Fi triggers, and vice-versa as described herein. For control plane modifications, since reference point R6 can use UDP packets over a default port (e.g., port 5000 in one implementation), mapping module 34 incorporates logic to understand reference point R6 events, as well as Wi-Fi events. In one implementation, mapping module 34 implements a number of state machines that simulate the WiMax behavior for every Wi-Fi client connecting to the access point. These state machines could be similar to the 802.11 state machines. Also potentially incorporated into mapping module 34 (e.g., in state machines) is a state relation between Wi-Fi and WiMax. In one example, clients connecting to the access point are virtually converted as a WiMax client (e.g., for the associated gateway) by mapping module 34. For the data plane, WiMax can provide for the use of IP packets encapsulated in GRE tunnels.
In one example implementation, Wi-Fi access point 32 includes software to achieve the mapping operations, as outlined herein in this document. In other embodiments, this feature may be provided external to Wi-Fi access point 32 or included in some other network device to achieve this intended functionality. Alternatively, network elements (e.g., ASN-GW 40 or 42) and Wi-Fi access point 32 include this software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein. In still other embodiments, one or both of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
Home AAA element 46 and visited AAA element 44 are server programs that handle requests [from other network elements on behalf of user equipment] for access to networking resources. Networking resources refers to any device, component, or element that provides some functionality to endpoints communicating in communication system 10. For a corresponding network, AAA elements [i.e., visited AAA element 44 and home AAA element 46] may also provide authentication, authorization, and accounting services and management. Authorization generally refers to the process of giving endpoints permission to do or to access something. In multi-user computer systems, a system administrator may define for the system which end users are allowed access to particular data in the system and, further, what privileges are provided for endpoints. Once an end user has logged into a network, the network may wish to identify what resources the end user is given during the communication session. Thus, authorization within communication system 10 may be seen as both a preliminary setting up of permissions by a system administrator and the actual checking or verification of the permission values that have been set up when the end user is attempting access. Authentication generally refers to the process of determining whether the end user is in fact who or what it is declared to be.
AAA elements typically interact with network access servers and gateway servers, and with databases and directories containing user information. One standard by which devices or applications communicate with an AAA element is through a Remote Authentication Dial-In User Service (RADIUS) protocol, while other standards that could be employed include the Terminal Access Controller Access Control System (TACACS) or DIAMETER protocols.
AAA elements may receive the IP address and other parameters from any suitable source, such as a dynamic host configuration protocol (DHCP) server or a domain name system (DNS) database element, in order to direct data to be communicated to an end user. The AAA element may include any suitable hardware, software, component, or element that operates to receive data associated with an end user and that provides corresponding AAA related functions to network components within communication system 10. In operation, home AAA element 46 can be configured with one home agent IP address. Authorization and IP address management may also be retrieved by the AAA element from a layer two tunneling protocol network server (LNS), which may be provided to address secure services for the end user where appropriate. The assigned IP address may be a private VPN or a public IP address. On assignment of the IP address, the DHCP server may perform update procedures for updating the assigned IP address and leasing parameters for the end user.
Home agent 50 can cooperate with DHCP servers during IP registration in order to assign an IP address to end users. On authentication, an end user may be assigned an IP address by the home agent. The DHCP server may subsequently update the DNS database before returning the IP address and other provisioned parameters to an end user. An IP tunnel may be established between the network and the home agent to enable secure end-to-end packet transport.
The foreign agents (FA) [potentially included within aforementioned ASN-GWs 40 and 42] are routing elements that could also be included within a network access server (NAS) in a network that allows a node to utilize a home network address. The foreign agent can tunnel datagrams to, and detunnel datagrams from, the home agent for the given home network.
ASN-GW 40 can provide access gateway functions between the wireless domain and the IP network. In example embodiments, it can be the first hop IP router from the user's perspective and, further, provide NAS and accounting client capabilities for interaction with AAA servers. ASN-GW 40 can support access network authentication and security functions. ASN-GW 40 can also provide local mobility anchor capability so that users can move between base stations. ASN-GW 40 also caches authentication and security information to accommodate fast roaming of users across base stations or between ASN-GWs 40 and 42. ASN-GW 40 can provide the termination of the mobility function across base stations and the foreign agent function. ASN-GW 40 can also map the radio bearer to the IP network. Additionally, it acts as an IP gateway for the IP host function that is located on the base station. In certain examples, ASN-GW 40 can offer IP functions performed for the access network including end-to-end quality of service, mobility, and security.
In regards to latency issues, it should be noted that any mobility scheme can result in a disruption in connections, at least for a short period of time during handoff. Hence, latency is an important parameter that needs to be addressed. This issue gains particular importance when networks are expected to support voice and video applications, which demand low latency. Typically, a wireless handoff procedure comprises several major events: discovery, connection, and data plane setup. First, the mobile node scans and discovers potential networks to which to connect. Once this has been done, it now connects to the selected network. The final step is to set up the data plane by obtaining an IP address through DHCP. In this scenario, let T be the total delay during handoff, and then this delay could be represented as:
T=tdiscover+tconnect+tdhcp
During the connection phase, a mobile node re-associates and authenticates. Thus, for this connection phase:
tconnect=tassociate+tauthenticate
Typical authentication in enterprise Wi-Fi networks is done using 802.1x with EAP. Events during the handover process account for significant delays. Authentication and DHCP events account for a major portion of these delays. The DHCP delay can be optimized by increasing lease times. Similarly, authentication delays could be reduced by using cached keys. However, none of these techniques works in heterogeneous network handovers.
A typical handover from Wi-Fi to WiMax would result in a latency of about 4 seconds, which inhibits the purpose of a mobility solution. In contrast, the mobility scheme outlined herein achieves improvements over this handover delay because it saves on DHCP and authentication delays. This is possible because DHCP and authentication are problematic in the scheme. Further, improvements are possible by the reuse of same session keys.
Turning to some of the example frames that may be used in communication system 10, management frames can be used to establish and maintain connections. The different frames that fall under the management category include a beacon frame, which is used by Wi-Fi access point 32 to periodically send information about its presence. The information transmitted includes the timestamp, SSID, etc. NICs can continually scan for the beacon to select an appropriate access point to which to associate. The probe request frame is used to obtain information from a station. The probe response frame is a response to a probe request frame, and is similar to the beacon frame. It can consist of capacity information, supported data rates, etc.
The authentication frame is used during the authentication process. The 802.11 authentication process is not to be confused with the 802.1X link layer network authentication of users. The 802.11 authentication requests a mobile station to establish its identity before sending frames. At this level of authentication, there is no data encryption. The standard defines two types of authentication. First, the open systems authentication consists of two communications—the client sends an authentication request to the access point (AP), and the AP sends an authentication response containing success or failure message. If MAC filtering is enabled, failure may occur at this level. This is the default type of authentication. Here, the client (e.g., the NIC) sends only one authentication frame, and the AP responds with a response frame. Second, the shared key authentication relies on the fact that both the parties participating in the process have some shared key or pass phrase. There are several types of shared key authentication available such as: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), etc. In shared key authentication, the NIC sends an initial authentication frame, and the AP responds with an authentication frame containing the challenge text. The NIC has to send back another authentication frame containing the encrypted challenge text using the shared key. The AP checks if the encryption is correct, and sends a response frame.
A deauthentication frame is sent when the communication between two parties is to be terminated. When deauthentication takes place, the client is automatically disassociated. For the association request frame, the Wi-Fi association request enables an access point to allocate resources to a client, and to synchronize with it. It is within this frame that data rates and other parameters are negotiated. A client sends an association request frame with information about itself to the SSID with which it desires to associate.
The association response frame is used by the access point to provide the status of the association request from a client. If the access point accepts the request, it reserves memory space for the client, and establishes an association ID for the client. In case a client associated with a particular access point roams away from it, or it finds another access point with a stronger beacon, it will send a reassociation request frame to the new access point. The new access point can then coordinate the forwarding of data frames that are still in the buffer of the previous access point. The reassociation response frame indicates the outcome of a reassociation request. Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates. The disassociation frame is used to indicate the termination of an association so that the access point can release the resources reserved.
Control frames assist in the delivery of data frames. Some of the most common control frames include the request to send (RTS) frame. The RTS/clear to send (CTS) function is optional and reduces frame collisions present when hidden stations have associations with the same access point. A station sends a RTS frame to another station as the first phase of a two-way handshake used before sending a data frame. A station responds to a RTS frame with a CTS frame, providing clearance for the requesting station to send a data frame. The CTS frame includes a time value that causes all other stations (including hidden stations) to hold off transmission of frames for a time period necessary for the requesting station to send its frame.
After receiving a data frame, the receiving station will utilize an error checking processes to detect the presence of errors. The receiving station will send an acknowledgement (ACK) frame to the sending station if no errors are found. If the sending station does not receive an ACK after a period of time, the sending station will retransmit the frame. Data frames can carry data from higher layers (e.g., DHCP process, TCP data, etc.).
EAP can be used in Wi-Fi to provide authentication functionalities. However, this authentication may differ from the Wi-Fi authentication described earlier. For example, at a first step, when a client attempts to connect to an access point, the EAP handshake process begins. At step two, an access point establishes a port for EAP-only traffic and asks the client for an identity. At a third step, the client responds and then the access point requests authentication from the server. At a fourth step, if a client is authenticated, the access point will accept traffic.
It should be noted that the EAP authentication is generally triggered after the Wi-Fi authentication process and at the start of the association. The process can be briefly described as follows: 1) the client requests association with the AP; 2) the AP replies to the association request with an EAP identity request; 3) the client sends an EAP identity response to the AP; 4) the client's EAP identity response is forwarded to the authentication server; 5) the authentication server sends an authorization request to the AP; 6) the AP forwards the authorization request to the client; 7) the client sends the EAP authorization response to the AP; 8) the AP forwards the EAP authorization response to the authentication server; 9) the authentication server sends an EAP success message to the AP; and 10) the AP forwards the EAP success message to the client and places the client's port in forward mode.
As outlined above, mobility in the WiMax access network can be handled by the ASN gateway, which typically resides at the operator's premise: connecting and servicing multiple WiMax base stations. Interaction between an ASN gateway and a base station can be done through the R6 reference point. The following are example R6 messages that can be utilized in a given network. A mobile station (MS) pre-attachment request is used by the base station to signal the ASN-GW about an arrival of a new MS. The MS pre-attachment response is used to communicate the authentication policy. For the MS pre-attachment acknowledgment, the base station sends an acknowledgment for the pre-attachment response. The EAP transfer consists of a series of messages used to transfer the authentication procedure messages. A key change directive is sent by the ASN-GW to indicate the completion of an EAP authentication procedure. The key change acknowledgment serves as an acknowledgment, indicating the receipt of a key change directive. The MS attachment request is initiated by the base station, which contains the MS registration context. The MS attachment response indicates the completion of the MS attachment with the ASN-GW. The MS attachment ACK serves as an acknowledgment to the ASN-GW, indicating the completion of the MS attachment (hence, triggering service flow creations).
For connection establishment, both WiMax and Wi-Fi can use special messaging to set up and tear down connections. For an event-based model, specific relationships can be established between the various events in Wi-Fi and WiMax. For instance, a WiMax connection establishment can be initiated using a pre-attachment request (e.g., as described by reference point R6). A Wi-Fi client can initiate its attachment process with an access point using an association request. Hence, a Wi-Fi association request can be directly mapped to a WiMax pre-attachment request. Similarly, various events that happen upon connection establishment in Wi-Fi and WiMax can be mapped.
Communication system 10 can handle authentication across heterogeneous networks. The same event-based approach can be applied by mapping different events in 802.1x authentication [e.g., in 802.11] with those in 802.16. For instance, an EAP Identity Request from the AAA server is forwarded to the client, and the EAP Response is forwarded to the AAA server. Similarly, key exchange messages are also mapped from one network to the other by the event mapping. Since both the networks can use the same authentication server, the scheme can support authentication mobility across these networks. This helps avoid complete authentication [while roaming between these networks] and reduces latency.
One of the major challenges that need to be addressed in a seamless mobility scheme is the question of managing IP addresses (e.g., how IP addresses are to be assigned to a multi-mode client). One solution is to assign separate IP address to each interface. However, this solution requires IP address assignment handling when the client switches from one access interface to the other and also adds latency. Example embodiments of the proposed architecture enable the same IP address to be used across both the Wi-Fi and the WiMax network interfaces, and this can be seamless from an application perspective.
Once a station is attached to the network, the data plane is set up by assigning an IP address. As discussed previously, a seamless mobility scheme uses the same IP address across multiple interfaces for a handoff. Therefore, the IP address assignment can be addressed by the Wi-Fi-WiMax mobility service agent. This IP address could be obtained from an external DHCP server, or from a DHCP server internal to the service agent. Since the service agent acts as an anchor, this IP assignment helps in obtaining the same address when the client connects through either interface.
Note that in certain example implementations, the mapping and/or coordinating functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an application specific integrated circuit [ASIC], digital signal processor [DSP] instructions, software [potentially inclusive of object code and source code] to be executed by a processor, or other similar machine, etc.). In some of these instances, a memory element [as shown in
In one example implementation, Wi-Fi access point 32 and/or ASN gateway 40 include software in order to achieve the mapping functionality outlined herein. Wi-Fi access point 32 includes a translating function for mapping purposes such that the translations between events (for Wi-Fi and WiMax) look uniform to ASN gateway 40 and an end user's device. These activities can be facilitated by mapping module 34. In certain example configurations, there is no upgrade required on the client side such that the ASN gateway 40 and/or the end user device does not need to be enhanced in order to be compatible with Wi-Fi access point 32.
Both Wi-Fi access point 32 and ASN-GW 40 can include memory elements for storing information to be used in achieving the mapping operations as outlined herein. Additionally, each of these devices may include a processor that can execute software or an algorithm to perform the mapping activities as discussed in this Specification. These devices may further keep information in any suitable memory element [random access memory (RAM), ROM, EPROM, EEPROM, ASIC, etc.], software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein should be construed as being encompassed within the broad term ‘memory element.’ Similarly, any of the potential processing elements, modules, and machines described in this Specification should be construed as being encompassed within the broad term ‘processor.’ Each of the network elements can also include suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment.
The process begins at step 1, as the 802.11 MS network entry starts. The access point broadcasts beacons, the MS discovers the access point by a probe request, and then receives a response from the access point in the form of probe response. This is followed by the 802.11 authentication (either open systems or shared key) at step 2. At step 3, the MS sends an association request to the base station. The association request can consist of data relating to: capability, listen interval, SSID, supported rates, etc. At step 4, on receipt of an association request, the base station sends a MS pre-attachment request message to its “default” ASN-GW/authenticator to signal that a new MS is entering the network.
The MS pre-attachment request message can contain the MS Information type length value (TLV) containing the authorization policy and base station information (BSINFO) sub-TLVs mobile station information (MSINFO). An authorization policy can have values as follows: bit #1 set 0x02 EAP authorization, bit #2 set 0x04 authenticated-EAP authorization (double-EAP), bits #1, #2 and #4=0 null authentication. Base station Information TLV can include the base station ID Sub-TLV containing the IPv4 address of the base station. The public key management (PKM) protocol version and MAC mode are not necessarily transferred to the authenticator. Receipt of the authorization policy TLV with content other than that specified above will result in the ASN gateway sending a MS pre-attachment response containing a Reject Cause Code sub-TLV in the MSInfo TLV. The Reject Cause Code can indicate an authentication failure.
At step 5, at receipt of the MS pre-attachment request, the selected ASN gateway creates a new context block for the MS ID contained in the R6 message header, and responds to the base station with the MS pre-attachment response message containing the MSINFO and BSINFO TLVs. For the MS Info, the information may include anchor GW/DPF ID sub-TLV [IPv4 address of the chosen ASN gateway], and authorization policy sub-TLV, authorization policy, [bit #1 set, single EAP]. For the BS Info, that information may include the BS ID sub-TLV reflecting the BSID TLV received in the corresponding MS pre-attachment request.
At step 6, the base station sends a MS pre-attachment ACK message to the ASN. There are no TLVs sent in this message. This is essentially a dummy ACK message because the MS running 802.11 does not understand SBC-RSP message. At step 7, the authenticator in the selected ASN gateway initiates the EAP authentication procedure with the mobile subscriber station. The trigger for this can be the MS pre-attachment ACK message from the base station, informing the ASN-GW that the SBC-RSP has been sent to the MS. The authenticator function of the ASN gateway can send the EAP Request/Identity message to the base station using the R6 AuthRelay-EAP-Transfer message. The ASN gateway should wait for the EAP-Response/Identity message from the mobile subscriber station. If this is not received within the configured timeout, the ASN gateway should retransmit the EAP-Request/Identity via the AuthRelay-EAP-Transfer message.
At step 8, the base station can relay the EAP Request/Identity payload of the Auth-Relay-EAP-Transfer message in the PKMv2 EAP-Transfer/PKM-RSP message to the mobile subscriber station. At step 9, the mobile subscriber station responds with an EAP Response/Identity message containing the network access identifier (NAI). This message is sent to the base station in the PKMv2 EAP-Transfer/PKM-REQ message. At step 10, the base station relays the EAP payload received in PKMv2 EAP-Transfer to the authenticator using the AuthRelay-EAP-Transfer message. At step 11, the EAP payload can be sent to the AAA server from the authenticator via the collocated AAA client using a RADIUS Access-Request message. The EAP payload can be encapsulated in the RADIUS “EAP message” attribute(s). The EAP authentication process (tunneling EAP authentication method) can be performed between the mobile subscriber station and the authentication server via the authenticator function of the ASN gateway. The base station provides a relay of the EAP payload between PKMv2 EAP-Transfer messages and AuthRelay-EAP-Transfer messages. The authenticator function in the ASN gateway can act in passthrough mode (e.g., forward the EAP messages received as a payload from the base station in the AuthRelay-EAP-Transfer messages to the AAA server in a RADIUS Access-Request message). The EAP payload returned from the AAA server in a RADIUS Access-Challenge message can be transferred to the base station in an AuthRelay-EAP-Transfer message. There may be multiple EAP message exchanges between the EAP supplicant, located at the mobile subscriber station, and the EAP Authentication Server, located at the AAA server. The EAP peers, supplicant and authentication server, can negotiate and perform the EAP method. On successful completion of EAP method, security keys (MSK and EMSK) are established at the EAP peers.
At step 12, the authenticator receives a RADIUS Access-Accept message from the AAA server indicating successful completion of EAP-based authentication and, further, includes the MS authorization profile and the required security context (i.e., MSK key). At step 13, the ASN GW/Authenticator sends the key change directive message to the base station to indicate completion of the EAP authentication process. The key change directive contains the MSINFO TLV with the authorization key (AK) Context sub-TLV and also the EAP Payload TLV indicating EAP success. The MS Info may include (but is not limited to): AK, Context AK, AK Lifetime, AK sequence number (SN), AKID, and cipher-based message authentication code (CMAC) KEY Count.
For the EAP payload TLV, when the authentication is complete, a message can be provided as: authentication result=success; PMKv2 Message Code TLV=EAP-Transfer. The AK context has been determined by the ASN gateway based on the MSK received in step 13. This message informs the base station that it should proceed with a PKMv2 3-way handshake (i.e., start the new Key Enforcement and Security Associations creating process). In the case of an authentication failure indication being received from the AAA server in step 12, the subscriber is de-registered from the network using the normal mode [network-initiated] network exit procedure. Although there are no registered paths, the base station can remove any state associated with the mobile subscriber terminal based on the MSID in the R6 message header of the Path Deregistration message.
At step 14, the base station acknowledges receipt of the key change directive message with a Key Change Acknowledgement message. At step 15, the base station sends an EAP-Success message to the mobile subscriber station using a PKMv2 EAP-Transfer message (PKM-RSP). This message is not protected by CMAC. [Note that this message in the initial entry is not protected.] The mobile subscriber station is waiting for the SA-TEK-Challenge from the base station to evaluate the CMAC tuple, and to confirm EAP completion and security keys acquisition.
At step 16, the base station forwards the result of the PKMv2 3-way handshake to the ASN Gateway/authenticator using a MS attachment request message. This message contains the MSINFO and BSINFO TLVs. For the MSInfo, the information may include REG Context (if PMKv2 handshake successful), Key Change Indicator (indicating Success or Failure). For BSInfo (which can be optional), this could include a BSID (e.g., IPv4 address of the base station serving the MS). At step 17, on receipt of the MS Attachment Request, the ASN gateway responds with an MS Attachment Response. This message contains the MSINFO TLV MSInfo, which may include a REG Context. If the REG context from the previous step indicates that the authorized service flows provided by AAA in step 13 cannot be supported, the Reject Cause Code Sub-TLV is included in the MSInfo TLV. The cause code value is set to “Registration Failure.” At step 18, the base station sends an association response message to the mobile subscriber station as specified in IEEE 802.11 (e.g., formatting the parameters from an appropriate combination of base station policy and the parameters of the ASN gateway response). The point in time when the REG-RSP is sent is an implementation decision of the base station (e.g., it may be sent before or after performing acknowledging the Registration Context exchange with the ASN gateway). This messaging may include the capability, status code, station ID, and supported rates.
At step 19, the base station sends an MS Attachment Acknowledgement message to the ASN gateway indicating that the association response has been sent to the MS. In the case that the mobile subscriber station does not receive the association response message, it will retransmit the association request message to the base station. At step 20, the ASN gateway initiates creation of the pre-provisioned service flows indicated in the profile received from the AAA in step 12. Data path establishment can occur at this step and the data flow can begin at step 21. For re-authentication, Wi-Fi standards describe the re-association frame in order to associate with a new access point. The re-association frame by the client can be used to trigger a re-authentication procedure in the R6 side.
The initial service flow creation process can be triggered by the ASN gateway. Since there is no flow corresponding to the DSC-Request and the DSC-Response, the base station sends a Path-Reg-Response on receipt of the Path-Reg-Request. The DHCP discover message sent by the subscriber can be suppressed or ignored until the initial path is created. Once the process is complete, the DHCP exchange can be initiated with the client sending a DHCP discover message. The gratuitous ARP message is used to check for duplicate IP addresses. The ARP messages could be subsequently discarded.
In terms of advantages, such an architecture offers a mobility scheme allowing seamless handover across Wi-Fi and WiMax. This can provide a convenient broadband access solution by offering several advantages to both end users and operators. First, the architecture can potentially reduce the amount of time in handover by minimizing the authentication latency. Second, such a configuration can also take a first step in addressing seamless authentication across heterogeneous wireless access. Third, such an architecture can address some of the issues in end-user transparent authentication. It is imperative to note that such a model (as outlined herein) can be extended as a platform to handle mobility across heterogeneous networks in a broader perspective. This would include schemes with latency dependent applications such as voice and video.
Note that with the example provided above, as well as numerous other examples provided herein, interaction may be described in terms of two, three, or four network elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that communication system 10 (and its teachings) are readily scalable and can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of communication system 10 as potentially applied to a myriad of other architectures.
It is also important to note that the steps in
Although the present disclosure has been described in detail with reference to particular arrangements and configurations, these example configurations and arrangements may be changed significantly without departing from the scope of the present disclosure. For example, although the present disclosure has been described with reference to particular communication exchanges involving certain AAA, registration, and protocols, communication system 10 may be applicable to other exchanges, routing protocols, or routed protocols in which packets (not necessarily the routing protocol/packets described) are exchanged in order to provide AAA information, QoS parameters, etc. Moreover, although communication system 10 has been illustrated with reference to particular elements and operations that facilitate the communication process, these elements and operations may be replaced by any suitable architecture or process that achieves the intended functionality of communication system 10.
Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 112 as it exists on the date of the filing hereof unless the words “means for” or “step for” are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this disclosure in any way that is not otherwise reflected in the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/488,151 US8665819B2 (en) | 2009-06-19 | 2009-06-19 | System and method for providing mobility between heterogenous networks in a communication environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/488,151 US8665819B2 (en) | 2009-06-19 | 2009-06-19 | System and method for providing mobility between heterogenous networks in a communication environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100325714A1 US20100325714A1 (en) | 2010-12-23 |
US8665819B2 true US8665819B2 (en) | 2014-03-04 |
Family
ID=43355465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/488,151 Active 2030-02-02 US8665819B2 (en) | 2009-06-19 | 2009-06-19 | System and method for providing mobility between heterogenous networks in a communication environment |
Country Status (1)
Country | Link |
---|---|
US (1) | US8665819B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8867490B1 (en) * | 2011-08-25 | 2014-10-21 | Accelera, Inc. | Secure and seamless handover between IP-based cellular networks and Wi-Fi networks |
US9510256B2 (en) | 2011-09-20 | 2016-11-29 | Wildfire.Exchange, Inc. | Seamless handoff, offload, and load balancing in integrated Wi-Fi/small cell systems |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006018647A1 (en) * | 2004-08-20 | 2006-02-23 | Rhoderick John Kennedy Pugh | Server authentication |
US20090193247A1 (en) * | 2008-01-29 | 2009-07-30 | Kiester W Scott | Proprietary protocol tunneling over eap |
TWI410105B (en) * | 2008-12-01 | 2013-09-21 | Inst Information Industry | Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework |
US9179296B2 (en) * | 2009-03-03 | 2015-11-03 | Mobilitie, Llc | System and method for device authentication in a dynamic network using wireless communication devices |
US8213459B2 (en) * | 2009-07-24 | 2012-07-03 | Clearwire Ip Holdings Llc | Systems and method for establishing a data-path between a mobile station and a home access service network gateway |
US8599768B2 (en) * | 2009-08-24 | 2013-12-03 | Intel Corporation | Distributing group size indications to mobile stations |
EP2479702A4 (en) * | 2009-09-17 | 2016-04-13 | Fujitsu Ltd | Base station, web application server, system and method |
US8443431B2 (en) * | 2009-10-30 | 2013-05-14 | Alcatel Lucent | Authenticator relocation method for WiMAX system |
CA2696037A1 (en) | 2010-03-15 | 2011-09-15 | Research In Motion Limited | Advertisement and dynamic configuration of wlan prioritization states |
EP2405678A1 (en) * | 2010-03-30 | 2012-01-11 | British Telecommunications public limited company | System and method for roaming WLAN authentication |
US8929346B2 (en) | 2010-05-14 | 2015-01-06 | Blackberry Limited | Advertisement and distribution of notifications in a wireless local area network (WLAN) |
US8442024B2 (en) | 2010-05-14 | 2013-05-14 | Research In Motion Limited | Advertisement and distribution of notifications in a wireless local area network (WLAN) |
US8458279B2 (en) * | 2010-05-14 | 2013-06-04 | Research In Motion Limited | Advertisement and distribution of notifications using extensible authentication protocol (EAP) methods |
US8681769B2 (en) | 2010-05-14 | 2014-03-25 | Blackberry Limited | Incorporation of a notification in a network name |
US9491619B2 (en) * | 2010-09-27 | 2016-11-08 | Infosys Technologies Ltd. | Method and system for preauthenticating a mobile node |
US8335174B2 (en) * | 2011-05-18 | 2012-12-18 | Radius Networks, Inc. | System and method for registering network information strings |
JP5760736B2 (en) * | 2011-06-22 | 2015-08-12 | 富士通株式会社 | communication device |
US9231841B2 (en) * | 2011-07-08 | 2016-01-05 | Telefonaktiebolaget L M Ericsson (Publ) | Bearer control on the basis of probing |
US8819191B2 (en) | 2011-07-12 | 2014-08-26 | Cisco Technology, Inc. | Efficient use of dynamic host configuration protocol in low power and lossy networks |
US8750180B2 (en) | 2011-09-16 | 2014-06-10 | Blackberry Limited | Discovering network information available via wireless networks |
KR101439534B1 (en) * | 2011-09-16 | 2014-09-12 | 주식회사 케이티 | Web Redirect Authentication Method and Apparatus of WiFi Roaming Based on AC-AP Association |
US9060263B1 (en) * | 2011-09-21 | 2015-06-16 | Cellco Partnership | Inbound LTE roaming footprint control |
US8942221B2 (en) | 2011-11-10 | 2015-01-27 | Blackberry Limited | Caching network discovery responses in wireless networks |
US9204299B2 (en) | 2012-05-11 | 2015-12-01 | Blackberry Limited | Extended service set transitions in wireless networks |
US9894599B2 (en) * | 2012-06-13 | 2018-02-13 | Qualcomm, Incorporated | Method and apparatus for WLAN initial link setup |
US10812964B2 (en) | 2012-07-12 | 2020-10-20 | Blackberry Limited | Address assignment for initial authentication |
US9137621B2 (en) | 2012-07-13 | 2015-09-15 | Blackberry Limited | Wireless network service transaction protocol |
US9301127B2 (en) | 2013-02-06 | 2016-03-29 | Blackberry Limited | Persistent network negotiation for peer to peer devices |
TWI578836B (en) | 2013-05-10 | 2017-04-11 | 瑞雷2股份有限公司 | Multi-tenant virtual access point-network resources virtualization |
US9503942B1 (en) * | 2013-12-20 | 2016-11-22 | Sprint Spectrum L.P. | Selection of air interface protocol based on spectral efficiency |
WO2017205715A1 (en) * | 2016-05-27 | 2017-11-30 | Wandering WiFi LLC | Transparently connecting mobile devices to multiple wireless local area networks |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060052099A1 (en) * | 2004-09-09 | 2006-03-09 | Parker Jeffrey L | Wireless protocol converter |
US20070021119A1 (en) * | 2005-06-23 | 2007-01-25 | Samsung Electronics Co., Ltd. | Apparatus and method for implementing handoff between heterogeneous networks in a wireless communication system |
US20070025297A1 (en) * | 2005-07-26 | 2007-02-01 | Samsung Electronics Co., Ltd. | Apparatus and method for processing vertical handoff in a wireless communication system |
US20070160017A1 (en) * | 2006-01-09 | 2007-07-12 | Cisco Technology, Inc. | Seamless roaming for dual-mode WiMax/WiFi stations |
US20070217427A1 (en) * | 2006-02-28 | 2007-09-20 | Samsung Electronics Co., Ltd. | Method and system for transmitting/receiving data in heterogeneous communication systems |
US20070268908A1 (en) * | 2006-05-17 | 2007-11-22 | T-Mobile Usa, Inc. | System and method for authorizing access to a UMA network based on access point identifier |
US20080004009A1 (en) * | 2006-06-30 | 2008-01-03 | Christopher Caldwell | System and method for connecting to a voice network, such as wirelessly connecting to a UMA network |
US20080107077A1 (en) * | 2006-11-03 | 2008-05-08 | James Murphy | Subnet mobility supporting wireless handoff |
US20080192770A1 (en) * | 2007-02-09 | 2008-08-14 | Mavenir Systems, Inc. | Internetworking multiple communication technologies |
US20090204725A1 (en) * | 2008-02-13 | 2009-08-13 | Microsoft Corporation | Wimax communication through wi-fi emulation |
US20090285176A1 (en) * | 2008-05-15 | 2009-11-19 | Nokia Corporation | Framework for internetworking between wman and wlan networks |
US20110038284A1 (en) * | 2008-04-21 | 2011-02-17 | Nortel Networks Limited | System and method for wireless relay frame structure, protocol, and operation |
US8537822B2 (en) * | 2008-11-10 | 2013-09-17 | Research In Motion Limited | Methods and apparatus for providing alternative paths to obtain session policy |
-
2009
- 2009-06-19 US US12/488,151 patent/US8665819B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060052099A1 (en) * | 2004-09-09 | 2006-03-09 | Parker Jeffrey L | Wireless protocol converter |
US20070021119A1 (en) * | 2005-06-23 | 2007-01-25 | Samsung Electronics Co., Ltd. | Apparatus and method for implementing handoff between heterogeneous networks in a wireless communication system |
US20070025297A1 (en) * | 2005-07-26 | 2007-02-01 | Samsung Electronics Co., Ltd. | Apparatus and method for processing vertical handoff in a wireless communication system |
US20070160017A1 (en) * | 2006-01-09 | 2007-07-12 | Cisco Technology, Inc. | Seamless roaming for dual-mode WiMax/WiFi stations |
US20070217427A1 (en) * | 2006-02-28 | 2007-09-20 | Samsung Electronics Co., Ltd. | Method and system for transmitting/receiving data in heterogeneous communication systems |
US20070268908A1 (en) * | 2006-05-17 | 2007-11-22 | T-Mobile Usa, Inc. | System and method for authorizing access to a UMA network based on access point identifier |
US20080004009A1 (en) * | 2006-06-30 | 2008-01-03 | Christopher Caldwell | System and method for connecting to a voice network, such as wirelessly connecting to a UMA network |
US20080107077A1 (en) * | 2006-11-03 | 2008-05-08 | James Murphy | Subnet mobility supporting wireless handoff |
US20080192770A1 (en) * | 2007-02-09 | 2008-08-14 | Mavenir Systems, Inc. | Internetworking multiple communication technologies |
US20090204725A1 (en) * | 2008-02-13 | 2009-08-13 | Microsoft Corporation | Wimax communication through wi-fi emulation |
US20110038284A1 (en) * | 2008-04-21 | 2011-02-17 | Nortel Networks Limited | System and method for wireless relay frame structure, protocol, and operation |
US20090285176A1 (en) * | 2008-05-15 | 2009-11-19 | Nokia Corporation | Framework for internetworking between wman and wlan networks |
US8537822B2 (en) * | 2008-11-10 | 2013-09-17 | Research In Motion Limited | Methods and apparatus for providing alternative paths to obtain session policy |
Non-Patent Citations (3)
Title |
---|
Alvarion, "The Disruptive Approach of Open WiMAX," White Paper, © 2007, 8 pages. |
Iyer et al., Handling Mobility Across WiFi and WiMAX, Jun. 21-24 2009, ACM, IWCMC '09 Proceedings, pp. 537-541. * |
Markus Bauer et. al., Comparison of Different Strategies for UMTS and WLAN Integration, presentation at the IP-based Cellular Networks (IPCN 2002) conference, Paris, France, Apr. 2002, 11 pages. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8867490B1 (en) * | 2011-08-25 | 2014-10-21 | Accelera, Inc. | Secure and seamless handover between IP-based cellular networks and Wi-Fi networks |
US9510256B2 (en) | 2011-09-20 | 2016-11-29 | Wildfire.Exchange, Inc. | Seamless handoff, offload, and load balancing in integrated Wi-Fi/small cell systems |
Also Published As
Publication number | Publication date |
---|---|
US20100325714A1 (en) | 2010-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10356619B2 (en) | Access through non-3GPP access networks | |
JP6093810B2 (en) | Configuring authentication and secure channels for communication handoff scenarios | |
JP6329993B2 (en) | Method and apparatus for accelerated link setup between an STA and an access point of an IEEE 802.11 network | |
US10021566B2 (en) | Non-mobile authentication for mobile network gateway connectivity | |
US9553875B2 (en) | Managing user access in a communications network | |
US9491623B2 (en) | System and method for cloning a Wi-Fi access point | |
US9445272B2 (en) | Authentication in heterogeneous IP networks | |
JP5955352B2 (en) | Mobility architecture using pre-authentication, pre-configuration and / or virtual soft handoff | |
KR101545879B1 (en) | Method and apparatus for providing network access to a user entity | |
US8477785B2 (en) | Method and system for interworking a WLAN into a WWAN for session and mobility management | |
US8885571B2 (en) | System and method for maintaining a communication session | |
EP2923280B1 (en) | Systems and methods for accessing a network | |
US9241367B2 (en) | System and method for wi-fi roaming | |
KR101124092B1 (en) | Mih pre-authentication | |
CA2413944C (en) | A zero-configuration secure mobility networking technique with web-base authentication method for large wlan networks | |
JP5043117B2 (en) | Kerberos handover keying | |
EP1500223B1 (en) | Transitive authentication authorization accounting in interworking between access networks | |
JP5503620B2 (en) | Communication system and access network information transfer manager | |
JP4615239B2 (en) | Common authentication and authorization methods between independent networks | |
US8074070B2 (en) | Method for fast, secure 802.11 re-association without additional authentication, accounting, and authorization infrastructure | |
US20140079007A1 (en) | Data stream transmission method and related device and system | |
US7499547B2 (en) | Security authentication and key management within an infrastructure based wireless multi-hop network | |
EP1523129B1 (en) | Method and apparatus for access control of a wireless terminal device in a communications network | |
EP2427995B1 (en) | Proactive authentication | |
US8817990B2 (en) | Kerberized handover keying improvements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:IYER, JAYARAMAN;IYER, ANAND PADMANABHA;SIGNING DATES FROM 20090617 TO 20090619;REEL/FRAME:022850/0834 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |